25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

► Authorization <strong>and</strong> accounting information can now be encrypted <strong>and</strong><br />

transmitted inside a ticket in the authorization data field. This facilitates the<br />

extension of the authentication scheme to include an authorization scheme as<br />

well.<br />

► A binding is provided for the Generic Security Service API (GSSAPI) to the<br />

Kerberos Version 5 implementation.<br />

22.12 Remote access authentication protocols<br />

Remote dial-in to the corporate intranet <strong>and</strong> to the Internet has made the remote<br />

access server a very vital part of today's internetworking services. More <strong>and</strong><br />

more mobile users are requiring access not only to central-site resources, but to<br />

information sources on the Internet. The widespread use of the Internet <strong>and</strong> the<br />

corporate intranet has fueled the growth of remote access services <strong>and</strong> devices.<br />

There is an increasing dem<strong>and</strong> for a simplified connection to corporate network<br />

resources from mobile computing devices, such as a notebook computer, or a<br />

palmtop device for e-mail access.<br />

The emergence of remote access has caused significant development work in<br />

the area of security. The AAA (triple A) security model has evolved in the industry<br />

to address the issues of remote access security. Authentication, authorization,<br />

<strong>and</strong> accounting answers the questions who, what, <strong>and</strong> when, respectively. Here<br />

we provide a brief description of each of the three As in the AAA security model:<br />

Authentication This is the action of determining who a user (or entity) is.<br />

Authentication can take many forms. Traditional<br />

authentication uses a name <strong>and</strong> a fixed password. Most<br />

computers work this way. However, fixed passwords have<br />

limitations, mainly in the area of security. Many modern<br />

authentication mechanisms utilize one-time passwords or<br />

a challenge-response query. Authentication generally<br />

takes place when the user first logs in to a machine or<br />

requests a service of it.<br />

Authorization This is the action of determining what a user is allowed to<br />

do. Generally, authentication precedes authorization, but<br />

again, this is not required. An authorization request might<br />

indicate that the user is not authenticated. (we do not<br />

know who they are.) In this case, it is up to the<br />

authorization agent to determine if an unauthenticated<br />

user is allowed the services in question. In current remote<br />

authentication protocols, authorization does not merely<br />

provide yes or no answers, but it can also customize the<br />

service for the particular user.<br />

872 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!